Researchers observed 13 malware attacks targeting iPhone users in India that exploited open source mobile device management (MDM) tools to breach corporate devices.
Open source intelligence enables analysts to identify threats and uncover details about attacker behavior to improve their decision-making around incident response.
Known vulnerabilities are the weaknesses that are most often exploited, but how can they be managed?
If your goal is active defense, open source options may be particularly useful because these tools can help you demonstrate value and shore up support.
Organizations with established risk management processes can drive efficiency and improve their overall risk posture by leveraging open source tools.
While fraudsters have yet to master adversarial AI, the only way for the security community to get ahead of the emerging threat is through collaborative defense.
Security researchers uncovered two new ransomware strains that use open source tools to minimize their victims' odds of recovering their encrypted files.
Three Practical Tips That Empower Developers and Prevent Open Source Security Risks From Entering Your Code
There are many benefits to developing software using open source code, but these components can also introduce vulnerabilities into your code.
A new open source vulnerability called Devil's Ivy could enable attackers to hijack security camera feeds and block legitimate users from accessing data.
New enhancements to IBM's application security testing solutions enable clients to simplify SAST, remediate open source vulnerabilities and more.